As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).
1. EXECUTIVE SUMMARY
- CVSS v4 8.6
- ATTENTION: Low Attack Complexity
- Vendor: Siemens
- Equipment: RUGGEDCOM ROX II family
- Vulnerability: Authentication Bypass Using an Alternate Path or Channel
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow a local attacker to bypass authentication and access a root shell on the device.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
Siemens reports that the following products are affected:
- RUGGEDCOM ROX MX5000: All versions
- RUGGEDCOM ROX RX1536: All versions
- RUGGEDCOM ROX RX5000: All versions
- RUGGEDCOM ROX MX5000RE: All versions
- RUGGEDCOM ROX RX1400: All versions
- RUGGEDCOM ROX RX1500: All versions
- RUGGEDCOM ROX RX1501: All versions
- RUGGEDCOM ROX RX1510: All versions
- RUGGEDCOM ROX RX1511: All versions
- RUGGEDCOM ROX RX1512: All versions
- RUGGEDCOM ROX RX1524: All versions
3.2 VULNERABILITY OVERVIEW
3.2.1 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288
Affected devices do not properly limit access through its Built-In-Self-Test (BIST) mode. This could allow an attacker with physical access to the serial interface to bypass authentication and get access to a root shell on the device.
CVE-2025-40761 has been assigned to this vulnerability. A CVSS v3.1 b
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: